A method of incorporating a second image into a primary image. A vectorial grid is created that is adapted for mapping on to the primary image. A deformation is applied to the grid using data from the second image. The deformed grid is then mapped onto the primary image to create an output image. The second image is revealable by applying a decoder to the output image.

Patent
   7512248
Priority
Feb 08 2002
Filed
Feb 08 2003
Issued
Mar 31 2009
Expiry
May 16 2024
Extension
463 days
Assg.orig
Entity
Large
3
11
all paid
1. A method of incorporating a second image into a primary image the method comprising:
utilizing a processor to perform the steps of:
(a) creating a curved or wavy vectorial grid adapted for mapping on to the primary image:
(b) applying a deforming to the grid using data from the second image; and
(c) mapping the deformed grid onto the primary image to create an output image;
wherein the second image is revealable by applying a decoder to the output image;
wherein the vectorial grid comprises a two-dimensional array of curved or wavy lines; and
wherein the decoder is an optical decoder which is a lenticular screen or grating with a like spacing to the vectorial grid, whereby the second image is revealed by viewing the output image through the optical decoder.
2. A method according to claim 1 wherein the output image is adapted to be printed onto a printed image area.
3. A method according to claim 1 wherein the frequency of the line varies across the vectorial grid, whereby the spacing of two adjacent lines in the grid is different from the spacing between another two adjacent lines in the grid.
4. A method according to claim 1 wherein the optical decoder is a transparent decoding lens with cylindrical lenticules aligned and spaced as for a vectorial grid.

The invention relates to a method of incorporating a secondary image into a primary image.

It has long been known to print documents, to protect them from forgery, using fine patterns constituting a background for a main image. The more complex the fine pattern, the more difficult it is to reproduce.

The developments of xerography, laser printing and scanning have created new problems for the printer. Special measures have been devised to make security documents uncopiable by standard or even advanced state of the art copiers and scanners, EP 0920383 being an example of such in which an “object” is worked into a background pattern by linear components of the background being “hollowed” i.e. thick lines becoming slightly spaced thin lines. Such hollowed regions are not readily visible to the naked eye, so they do not mar the appearance of the major image, but they “fool” a photocopier, and are visible in a photocopy. The object″ in question can be a word, such for example, as “FORGERY”.

This is fine for demoralising the would-be forger who is sophisticated enough only to rely on a photocopier. The first copy taken on the machine appears with the word “FORGERY” in it, and the would-be forger is supposed to abandon the attempt.

The determined forger, however, will realise that he is simply using the wrong copying technique, and switch to something more appropriate.

Essentially, the truth of the mailer is that anything that can be made can be copied, if enough resource is put into the attempt. It is, clearly, only necessary to replicate the production process for the original, and the copy will be perfect. Where there is sufficient incentive, the cost of replicating the production process will be willingly borne by the forger.

There are documents, however, that, while needing to be secure, do not merit undue cost in their creation.

In accordance with a first aspect of the present invention, there is provided a method of incorporating a second image into a primary image, the method comprising:

Preferably, the output image is adapted to be printed onto a printing image area.

Typically, the method is used for security printing.

In accordance with a second aspect of the present invention, there is provided a method for security printing comprising incorporating a secondary, hidden, image in a primary image, comprising the steps of:

The term “vectorial grid” as used herein covers a two dimensional array of straight parallel lines or curved parallel lines, or a two dimensional array of dots where the dots define an array of substantially parallel lines.

Preferably, the decoder is an optical decoder. Typically, the second image is revealable by viewing the output image through the optical decoder.

In one example of the invention, the grid comprises an array of curved lines. In another example of the invention, the grid comprises an array of straight lines. The lines maybe inclined to the top/bottom axis of the grid.

In a further example of the invention, the grid comprises an array of dots.

Typically, the optical decoder comprises a lenticular screen or grating with the like spacing to the vectorial grid.

However, the vectorial grid could be comprised of wavy lines or a wavy array of dots. Typically, the optical decoder has similar characteristics.

A method for security printing involving off-set dots in a security area is described in WO01/87632. Here, the printing screen is modified, and a special decoding screen used to detect a hidden image in the modified area. However, the modification is not, even though only slight, per se undetectable by the naked eye, and has to be disguised through the use of peripheral dots “tapering off” the dot displacement with respect to background dots.

Security printing produced by the method does not necessarily show up on photocopying, so it may be arranged that photocopies may be made without the copier realising there is a hidden image, but that they would be detectable by the appropriate decoder screen.

Methods of security printing according to the invention will now be described with reference to the accompanying drawings, in which:

FIG. 1 is a primary image;

FIG. 2 is a secondary image;

FIG. 3 is a first vectorial grid;

FIG. 4 is the grid of FIG. 3 deformed using data from the secondary image;

FIG. 5 is an encoded vector image being the primary image mapped on to the deformed vectorial grid of FIG. 4;

FIG. 6 is an encoded bit map image made by applying the deformed grid of FIG. 4 to the primary image;

FIG. 7 is a second vectorial grid;

FIG. 8 is the grid of FIG. 7 deformed using data from the secondary image;

FIG. 9 is an encoded vector image obtained by applying the deformed grid of FIG. 8 to the primary image;

FIG. 10 is an encoded bit map image obtained by applying the deformed grid of FIG. 8 to the primary image;

FIG. 11 shows a first decoding screen;

FIG. 12 shows a secondary decoding screen; and

FIG. 13 shows the effect of using an appropriate decoding screen on an encoded image.

The drawings illustrate the methods for security printing comprising incorporating a secondary, hidden image (FIG. 2) in a primary image (FIG. 1), comprising the steps of:

FIG. 3 shows a vectorial grid of straight lines, while FIG. 7 shows a vectorial grid of wavy lines, in each case inclined to the top/bottom axis A-A of the image space. The lines could, in each case, be replaced by corresponding arrays of dots.

The final images, FIGS. 5, 6, 9 and 10 contain no information visible to the naked eye that they are other than they appear. They can even be arranged to be photocopiable without any hidden image showing up in the copy, although, of course, it can readily be arranged, by an convenient prior art techniques, that they are also not photocopiable.

FIG. 11 shows a first decoding screen 11 suitable for use with images generated using the vectorial grid of FIG. 3. It comprises a transparent decoding lens, which can be moulded in clear plastic, with cylindrical lenticules 12 aligned and spaced exactly as the vectorial grid lines by FIG. 3.

A decoding screen suitable for images generated using the grid of FIG. 7 would be similar, but with the lenticules 12 made wavy, corresponding to the waves of the FIG. 7 grid.

FIG. 12 illustrates a decoding screen 13 suitable for use with a vectorial grid comprising an array of dots rather than a grid of lines. Instead of the cylindrical lenticules of FIG. 11, it has spherical lenticules correspondingly arrayed to the dots of the vectorial grid.

FIG. 13 shows how the hidden secondary image is revealed when overlain with a decoding screen.

The method is suitable for both monochrome and colour images, and can be used equally well on still images and on movie frames, when the secondary image can itself be a movie image.

In colour printing, multiple secondary images can be hidden within different separations of a colour output of type CYMK (cyan, yellow, magenta, black), RGB (red, green, blue), or multiple spot colours. The different hidden images can be revealed individually by different colour filter decoding screens.

In an image of a person, personal data can be included as the secondary image. The final image may be a low-resolution raster image, and may be in colour.

The primary image may be a flat tint and the greyscale density from the secondary image used to encode it—the result looks like a flat tint. The hidden data in the final picture is revealed by a decoder screen which can comprise a lenticular screen or a grating, which may be of straight or wavy lines, or an array (straight or wavy) of dots.

Multiple secondary images can be used in this way for different colours, as before, to make a CYMK, RGB or multiple spot colour image.

A “still” movie can be made by incorporating within a primary image date from a plurality of time-linked secondary images. As the decoder screen is turned through different angles, the secondary images are revealed in sequence. Whilst this can, of course, be used in a security printing context, it can also be of more general appeal, in children's publications, greetings cards and point-of-sale promotions, for example.

As an additional security measure, the primary image may comprise an almost flat tint filled with microtext. The secondary image can be of line work or a grey scale image, and distorts the primary image by shifting letters or letter sequences in the microtext relative to others. The decoder reveals the hidden image. Microtext will usually defeat photocopying because the photocopier does not have the resolving power to reproduce microtext.

In addition, the frequency of the lines or dots may vary across the grid. For example, if the grid comprises lines, the spacing of two adjacent lines in the grid may be different from the spacing between another two adjacent lines in the grid.

The method can be configured in printer-driving software.

Smith, Ian Rodney

Patent Priority Assignee Title
8792674, Oct 11 2010 Graphic Security Systems Corporation Method for encoding and simultaneously decoding images having multiple color components
9092872, Oct 11 2010 Graphic Security Systems Corporation System and method for creating an animation from a plurality of latent images encoded into a visible image
9349085, Apr 16 2015 DigiComp Inc.; DIGICOMP INC Methods and system to decode hidden images
Patent Priority Assignee Title
5178418, Jun 25 1991 Canadian Bank Note Co., Ltd. Latent images comprising phase shifted micro printing
5708717, Nov 29 1995 Graphic Security Systems Corporation Digital anti-counterfeiting software method and apparatus
6171734, May 10 1996 Graphic Arts Technical Foundation Security printed document to prevent unauthorized copying
6209922, Feb 19 1999 AGFA NV Copy protected security print
6768558, Nov 16 1999 Hitachi, Ltd. Printed matter including invisible information and printing system
EP953939,
EP1102208,
ES2119705,
GB2315240,
WO187632,
WO9807572,
///
Executed onAssignorAssigneeConveyanceFrameReelDoc
Feb 08 2003Nautilus (GB) Limited(assignment on the face of the patent)
Sep 15 2004SMITH, IAN RODNEYASCENT SYSTEMS SOFTWARE LIMITEDASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0163100634 pdf
Oct 04 2005ASCENT SYSTEMS SOFTWARE LTD NAUTILUS GB LTD ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0194460754 pdf
Date Maintenance Fee Events
Jun 09 2009ASPN: Payor Number Assigned.
Aug 29 2012M1551: Payment of Maintenance Fee, 4th Year, Large Entity.
Sep 15 2016M1552: Payment of Maintenance Fee, 8th Year, Large Entity.
Sep 18 2020M1553: Payment of Maintenance Fee, 12th Year, Large Entity.


Date Maintenance Schedule
Mar 31 20124 years fee payment window open
Oct 01 20126 months grace period start (w surcharge)
Mar 31 2013patent expiry (for year 4)
Mar 31 20152 years to revive unintentionally abandoned end. (for year 4)
Mar 31 20168 years fee payment window open
Oct 01 20166 months grace period start (w surcharge)
Mar 31 2017patent expiry (for year 8)
Mar 31 20192 years to revive unintentionally abandoned end. (for year 8)
Mar 31 202012 years fee payment window open
Oct 01 20206 months grace period start (w surcharge)
Mar 31 2021patent expiry (for year 12)
Mar 31 20232 years to revive unintentionally abandoned end. (for year 12)